ID

VAR-202601-4617


CVE

CVE-2022-40620


TITLE

of netgear R6230  Certificate verification vulnerability in multiple products, including firmware

Trust: 0.8

sources: JVNDB: JVNDB-2026-006515

DESCRIPTION

FunJSQ, a third-party module integrated on some NETGEAR routers and Orbi WiFi Systems, does not properly validate TLS certificates when downloading update packages through its auto-update mechanism. An attacker (suitably positioned on the network) could intercept the update request and deliver a malicious update package in order to gain arbitrary code execution on affected devices. This affects R6230 before 1.1.0.112, R6260 before 1.1.0.88, R7000 before 1.0.11.134, R8900 before 1.0.5.42, R9000 before 1.0.5.42, and XR300 before 1.0.3.72 and Orbi RBR20 before 2.7.2.26, RBR50 before 2.7.4.26, RBS20 before 2.7.2.26, and RBS50 before 2.7.4.26. TLS It does not properly validate certificates. This is due to R6230 version of 1.1.0.112 less than, R6260 of 1.1.0.88 less than, R7000 of 1.0.11.134 less than, R8900 of 1.0.5.42 less than, R9000 of 1.0.5.42 less than, XR300 of 1.0.3.72 Less than and Orbi of RBR20 of 2.7.2.26 less than, RBR50 of 2.7.4.26 less than, RBS20 of 2.7.2.26 less than, RBS50 of 2.7.4.26 Vulnerabilities affecting less thanAll information handled by the software may be leaked to the outside. All information handled by the software may be rewritten. Furthermore, part of the software may stop functioning. Furthermore, attacks that exploit this vulnerability will not affect other software

Trust: 1.62

sources: NVD: CVE-2022-40620 // JVNDB: JVNDB-2026-006515

AFFECTED PRODUCTS

vendor:netgearmodel:rbr20scope:ltversion:2.7.2.26

Trust: 1.0

vendor:netgearmodel:r6260scope:ltversion:1.1.0.88

Trust: 1.0

vendor:netgearmodel:r6230scope:ltversion:1.1.0.112

Trust: 1.0

vendor:netgearmodel:r9000scope:ltversion:1.0.5.42

Trust: 1.0

vendor:netgearmodel:r7000scope:ltversion:1.0.11.134

Trust: 1.0

vendor:netgearmodel:rbs20scope:ltversion:2.7.2.26

Trust: 1.0

vendor:netgearmodel:xr300scope:ltversion:1.0.3.72

Trust: 1.0

vendor:netgearmodel:rax120scope:ltversion:1.2.8.40

Trust: 1.0

vendor:netgearmodel:rax120v2scope:ltversion:1.2.8.40

Trust: 1.0

vendor:netgearmodel:r8900scope:ltversion:1.0.5.42

Trust: 1.0

vendor:ネットギアmodel:r9000scope: - version: -

Trust: 0.8

vendor:ネットギアmodel:r6260scope: - version: -

Trust: 0.8

vendor:ネットギアmodel:rbr20scope: - version: -

Trust: 0.8

vendor:ネットギアmodel:r8900scope: - version: -

Trust: 0.8

vendor:ネットギアmodel:r6230scope: - version: -

Trust: 0.8

vendor:ネットギアmodel:r7000scope: - version: -

Trust: 0.8

vendor:ネットギアmodel:rbs20scope: - version: -

Trust: 0.8

vendor:ネットギアmodel:xr300scope: - version: -

Trust: 0.8

vendor:ネットギアmodel:rax120v2scope: - version: -

Trust: 0.8

vendor:ネットギアmodel:rax120scope: - version: -

Trust: 0.8

sources: JVNDB: JVNDB-2026-006515 // NVD: CVE-2022-40620

CVSS

SEVERITY

CVSSV2

CVSSV3

134c704f-9b21-4f2e-91b3-4a467353bcc0: CVE-2022-40620
value: HIGH

Trust: 1.0

OTHER: JVNDB-2026-006515
value: HIGH

Trust: 0.8

134c704f-9b21-4f2e-91b3-4a467353bcc0: CVE-2022-40620
baseSeverity: HIGH
baseScore: 7.7
vectorString: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:L
attackVector: NETWORK
attackComplexity: HIGH
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: LOW
exploitabilityScore: 2.2
impactScore: 5.5
version: 3.1

Trust: 1.0

OTHER: JVNDB-2026-006515
baseSeverity: HIGH
baseScore: 7.7
vectorString: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:L
attackVector: NETWORK
attackComplexity: HIGH
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: LOW
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: JVNDB: JVNDB-2026-006515 // NVD: CVE-2022-40620

PROBLEMTYPE DATA

problemtype:CWE-295

Trust: 1.0

problemtype:Illegal certificate verification (CWE-295) [ others ]

Trust: 0.8

sources: JVNDB: JVNDB-2026-006515 // NVD: CVE-2022-40620

PATCH

title:Security Advisory for Vulnerabilities in FunJSQ on Some Routers and Orbi WiFi Systems, PSV-2022-0117 - NETGEAR Supporturl:https://www.onekey.com/resource/security-advisory-netgear-routers-funjsq-vulnerabilities

Trust: 0.8

sources: JVNDB: JVNDB-2026-006515

EXTERNAL IDS

db:NVDid:CVE-2022-40620

Trust: 2.6

db:JVNDBid:JVNDB-2026-006515

Trust: 0.8

sources: JVNDB: JVNDB-2026-006515 // NVD: CVE-2022-40620

REFERENCES

url:https://www.onekey.com/resource/security-advisory-netgear-routers-funjsq-vulnerabilities

Trust: 1.0

url:https://kb.netgear.com/000065132/security-advisory-for-vulnerabilities-in-funjsq-on-some-routers-and-orbi-wifi-systems-psv-2022-0117

Trust: 1.0

url:https://nvd.nist.gov/vuln/detail/cve-2022-40620

Trust: 0.8

sources: JVNDB: JVNDB-2026-006515 // NVD: CVE-2022-40620

SOURCES

db:JVNDBid:JVNDB-2026-006515
db:NVDid:CVE-2022-40620

LAST UPDATE DATE

2026-03-12T23:45:43.242000+00:00


SOURCES UPDATE DATE

db:JVNDBid:JVNDB-2026-006515date:2026-03-11T06:57:00
db:NVDid:CVE-2022-40620date:2026-03-09T14:41:45.690

SOURCES RELEASE DATE

db:JVNDBid:JVNDB-2026-006515date:2026-03-11T00:00:00
db:NVDid:CVE-2022-40620date:2026-01-28T19:16:19.773